Decryption with Wildcard SSL-certificate?

Showing results for 
Show  only  | Search instead for 
Did you mean: 

Decryption with Wildcard SSL-certificate?

L2 Linker

Does Palo Alto support decryption with Wildcard SSL-cert?

In order to determine if a connection needs to be decrypted or not, the firewall relies on the (CN) common name configured within the certificate and compares that to the security policy. ( )


L2 Linker

Inbound or outbound decryption?

Hi, for outbound decryption

is it possible to tell me the url? and which one do you want to decrypt or not to decrypt?


short answer: it will decrpyt. but if you want to exclude a specific host / subdomain, there could be a problem. you also need to look at the decryption rule.


The firewall does not only rely on the CM in order to decide if the connection needs to be decrypted. In most connections (everything from a browser that is not older than about 4 years) the TLS handshake client hello packet contains the Server Name Indicator extension. In this field the client specifies the required FQDN and this is also checked by the firewall. So even the server has a wildcard cert the exclusion can normally still be configured with the FQDN - if the client sends a handshake packet WITH this extension.

There are no external URL, this is between two internal zones.
Problem is we are not able to decrypt the traffic using our own wildcard SSL-certificate..


If you try to use a wildcard cert AS decryption cert -> this is not gonna work. You need to either configure a CA certificate or use inbound decryption if you are only talking about one or a few servers.


ok maybe i dont get it. you talking about outbound decryption, but between two internal zones?

can you tell me where is the wildcard certificate installed? on the server you which to connect to, right?

if so, this normally could be possible to decrypt if:

- you have an ca certifiacte installed and checked it under certificates as your trusted forward certificate (as vsys_remo mentioned)

- you have an adequate decprytion rule for your "outbound" connection, where "outbound" means from one zone to the other

- the server is using a protocol (no proprietary encryption) and cipher suite which is supported by your PANOS Version

Sorry guys - I gave an wrong answer earlier on, this is for inbound sessjons, not outbound...

Ahhh, ok. For inbound i think it will work. I can check it on a Lab Unit the next days if you want?

Problem is - we can't make it work.... 
So if anyone have a better description than the whitepaper, that would be a good start for me



And you are sure, that your server didn't use any unsupported ciphers??

Check it here:

And check it on your servers or the best way is to take a packet capture and analyse the ssl handshake to see if there are any unsupported ciphers in use.


For a quick check use the global counters. Here is an article that maybe help:




"Problem is - we can't make it work...."


If you can supply any more details than that, it would be very helpful.


What isn't working?

Can you not assign the certificate to the decryption rule?

Did you import the private key when you imported your wildcard?

Does everything appear correctly but the traffic just isn't decrypted?

What PAN-OS version are you using?


Some more details will help people trying to assist. The answers to the questions above can help narrow down where to help you troubleshoot.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!